Venture Finance under Flexible Information Acquisition

Size: px
Start display at page:

Download "Venture Finance under Flexible Information Acquisition"

Transcription

1 Venture Finance under Flexible Information Acquisition Ming Yang Duke University Yao Zeng Harvard University October, 2012 (Preliminary and Incomplete) Abstract This paper investigates the finance for venture projects through the lens of information acquisition. It highlights the role of venture investors as information experts, who are more capable to acquire information about the market prospects of entrepreneurs venture technologies and then help screen them by their financing decision. It employs and further develops the flexible information acquisition approach to explore the specific interplay between contract design and information acquisition. It predicts specific contracts between entrepreneurs and venture investors, which correspond to the convertible preferred stock and the standard debt in terms of the allocation of cash flow rights. These predictions and related comparative statics are consistent with empirical evidences. Keywords: venture projects, flexible information acquisition, security design JEL: D82, D86, G24, G32, L26 We thank Snehal Banerjee, Emmanuel Farhi, Simon Gervais, Barney Hartman-Glaser, Benjamin Hebert, Steven Kaplan, Arvind Krishnamurthy, Josh Lerner, Stephen Morris, Jonathan Parker, Raghu Rajan, Adriano Rampini, David Robinson, Paola Sapienza, Hyun Song Shin, Andrei Shleifer, Alp Simsek, S. Viswanathan, and Michael Woodford for helpful comments. All errors are ours.

2 1 Introduction This paper investigates the finance for venture projects through the lens of information acquisition. We highlight the role of venture investors as information experts. Specifically, they are more capable to acquire information about the uncertain market prospects of entrepreneurs venture technologies by their industry experience, and thus help screen in good venture projects by their financing decision. The main contribution of this paper is to explain why and how different venture projects are financed by different contracts, and to reveal the role of information in this process. Specifically, we show that the standard debt and the convertible preferred stock are two most typical contracts to finance venture projects, which is consistent with the empirical evidences. Moreover, we figure out several key factors that determine the form of the optimal contract by performing comparative statics of the venture contracts. These factors include the cost-benefit efficiency and risk of venture projects, as well as the difficulty in evaluating the market prospect of venture projects, which is measured by venture investors information cost. This paper not only offers new insights on the finance for venture projects, but also reveals the interplay between security design and information acquisition in a more systematic way. The specific framework of this paper focuses on the interaction between information acquisition and contract design in financing venture projects. The acknowledgement of information acquisition in innovations and entrepreneurship is dated back to Frank Knight (1929) and Joseph Schumpeter (1942). Both authors highlight information acquisition and provision as important jobs conducted by innovators and entrepreneurs. Nevertheless, modern research on innovation and entrepreneurship have gradually shifted attention to the role of information acquisition by investors. As surveyed by Da Rin, Hellmann and Puri (2011), although entrepreneurs may have some information advantage on their own venture technology, modern venture investors, like venture capitalists, angels and banks, often have more expertise in acquiring information about the uncertain market prospects of venture technologies by their industry experience. Investors further help screen in good venture projects by such information expertise. Besides numerous anecdotal evidences (c.f. Kaplan and Lerner (2010) for a review), recent empirical literature (Kerr, Lerner and Schoar, 2011; Chemmanur, Krishnan and Nandy, 2012) have also increasingly acknowledged the screening effects by various venture investors. Therefore, it is necessary and natural to view contracts between entrepreneurs and venture investors as an incentive scheme to induce optimal information acquisition by venture investors. Although contract and security design is the focus of modern research in innovation and entrepreneurial finance, existing theoretical literature mainly pay attention to the aspects of monitoring and moral hazard (Schmidt, 2003; Casamatta, 2003; Hellmann, 2006), refinancing and staging of finance (Admati and Pfleiderer, 1994; Bergemann and Hege, 1998; Conelli and Yosha, 2003; Repullo and Suarez, 2004), as well as allocation of control rights (Berglof, 1994; Hellmann, 1998; Kirilenko, 2001; de Bettignies, 2008), leaving the 1

3 role of screening and information acquisition largely untouched. Also, existing models often fail to deliver consistent theoretical predictions with real-world contracts between entrepreneurs and venture investors. For instance, as documented in Da Rin, Hellmann and Puri (2011), the most commonly used double moral hazard models are able to approximately predict the contract of convertible debt between entrepreneurs and venture capitalists, but these models cannot deliver the correct specific allocation of cash flow rights between the two parties. This paper, to the best of our knowledge, is the first to explicitly investigate the channel of information acquisition in the finance of venture projects and deliver specific theoretical predictions that are consistent with corresponding empirical evidences regarding the contracts between entrepreneurs and venture investors (Kaplan and Stromberg, 2003). The contribution of this paper stems from a new concept, flexible information acquisition, which matches the characteristics of our research target. From the finance perspective, different venture projects are essentially characterized by the different cash flows they generate, which further require different contracts to reconcile the interests of entrepreneurs and investors. Designing contracts shapes investors incentives of information acquisition, and thus calls for a sufficiently flexible characterization of information acquisition to capture the potential variety of incentives generated by various contracts. Hence, the traditional approach of exogenous information asymmetry is inadequate. Moreover, classic models of information acquisition also fail to hit our target, since they implicitly impose some rigid information acquisition technologies with restrictions on signals (cf. Veldkamp (2011) for a review). Because of such rigidity, the strategic interplay between contract design and information acquisition cannot be fully analyzed. In contrast, our new approach of flexible information acquisition following Yang (2012a, 2012b) allows agents to choose not only how much information, namely, the quantitative nature of information to acquire, but also the qualitative nature of their information. Concretely, flexible information acquisition switches the gear of rational inattention (Sims, 2003) from macroeconomic decision problems to microeconomic strategic interactions as a new focus, in which agents can actively use their information capacities to choose any information structure (i.e., conditional distribution of signal realization given the fundamental). Such information structure characterizes both quantitative and qualitative nature of information acquired, which is shaped by the underlying contracts. For instance, a debt holder would allocate her attention to bad states as only the default risk matters, while an equity investor wants to pay more attention to good states as she enjoys the upside. This strategic interplay between contract design and information acquisition can be captured by neither exogenous information asymmetry nor rigid information acquisition models. This paper delivers new insights regarding the finance for venture projects and their information essence. Specifically, we can formulate the specific contracts required to finance various venture projects that differ in nature. In terms of the specific allocation of cash flow rights, these contracts corresponds to the convertible preferred stock and the standard debt. Specifically, 2

4 when the entrepreneur s optimal contract induces the investor to acquire information, the optimal contract is the convertible preferred stock. When the entrepreneur s optimal contract does not induce the investor to acquire information, the optimal contract turns out to be a standard debt. Importantly, the shape of these contracts not only reflects that the entrepreneur wants to design such contracts that the investor is willing to acquire more information to help distinguish between good states and bad states, but also characterizes the detailed information acquired by the investor in financing the venture projects. Moreover, different venture projects are endogenously financed by different contracts and potentially different venture investors. This can be clearly seen from the evolution of these contracts according to the change of natures of venture projects. Such evolution could be investigated from both the cross-sectional perspective to focus on industry-wide comparisons and the time-series perspective to look into firms life-cycle effect of innovations and venture projects. Concretely, as the market prospects of venture projects vary, investors will reallocate their attention accordingly, which results in different contracts eventually employed in financing corresponding venture projects. The optimal contracts also change as the characteristics of investors vary, mainly in their information costs. This dimension allows our analysis to cover venture capitalists, angels, banks and other financial institutions. This paper complements to Yang (2012a), which focuses on the role of flexible information acquisition in a pure liquidity provision problem and highlights the optimality of securitized debt. In that model, a seller has an asset in-place and proposes an asset-backed security to a potential buyer to raise liquidity. The buyer acquires information before her purchase decision, which leads to endogenous adverse selection. Similarly, Yang (2012a) assumes no information asymmetry before bargaining, but the buyer has an expertise in acquiring information about the fundamental following flexible information acquisition. The buyer collects the most payoff-relevant information determined by the shape of the security, and thus the seller designs the security in order to induce the buyer to acquire information least harmful to the seller s interest. It is shown that issuing securitized debt is uniquely optimal in raising liquidity. A key feature driving the unique optimality of debt is that the seller s asset is already in-place and the underlying cash flow does not depend on the trade, which means the aggregate risk is fixed. These results not only resolves the obscurity in Dang, Gorton and Holmstrom (2011) s optimality of quasi-debts, but also offers a benchmark for this paper, where the aggregate risk is variable in the finance of venture projects. When the aggregate risk is fixed as in Yang (2012a), the central implication of flexible information acquisition is endogenous information asymmetry and adverse selection. On the contrary, in this paper, venture projects can only be initiated if they are adequately financed. When the underlying cash flows of venture projects depend on the consequence of liquidity provision and thus the aggregate risk is variable, adverse selection is no longer the focus. Instead, entrepreneurs want to design such a contract that venture investors have the incentive to acquire information that is favorable to entrepreneurs interests. Intuitively, as venture investors 3

5 are more capable than entrepreneurs to acquire information about the uncertain market prospects of venture technologies, entrepreneurs would like to take advantage of such information expertise to help them screen in good venture projects. Therefore, debt is not optimal when information acquisition is desirable, and the model implications on liquidity are also different. Moreover, this paper delivers clear implications on liquidity provision and the associated specific allocation of cash flow rights in various economies and financial markets. In this model, the aggregate risk is variable in the finance of venture projects, so that the circumstance could be viewed as a production economy or a primary financial market. In contrast, the circumstance of Yang (2012a), where the aggregate risk is fixed, could be viewed as an exchange economy or a secondary financial market. Such comparison further helps us to understand why different optimal contracts arise in different circumstances. Earlier mechanism design literature pertaining to information gathering also highlight such comparison between different economies or financial markets and suggest that the value of information would be different accordingly (Cremer and Khalil, 1992; Cremer, Khalil and Rochet, 1998a, 1998b). But these papers do not focus on the security design problem and cannot make specific predictions on the forms of contracts in different economies or financial markets. Together with Yang (2012a), this paper fills this gap by delivering specific forms of contracts for liquidity provision in different circumstances. This paper is also closely related to a series of theoretical work on information, screening and optimal security design. These models predict non-debt-like securities in various circumstances where information asymmetry may be favorable (Nachman and Noe, 1994; Fulghieri and Lukin, 2001; Inderst and Mueller, 2006; Hennessy, 2009; Chakraborty and Yilmaz, 2011; Dow, Goldstein and Guembel, 2011; Fulghieri, Garcia and Hackbarth, 2012). Compared to those papers, most of which focus on ex-ante information asymmetry or rigid information acquisition, our model delivers clearer interaction between contract design and the corresponding information asymmetry resulted from information acquisition. This enables us to capture the role of information more explicitly in characterizing the optimal contract between entrepreneurs and investors. Also, thanks to the technique of flexible information acquisition, our model is able to characterize the shapes of optimal securities more specifically. Through this line, our model also highlights the standard intuition of information sensitiveness that non-debt-like securities may encourage investors to acquire information and facilitate information aggregation. The rest of the paper is organized as follows. Section 2 specifies the environment of venture finance and elaborates the concept of flexible information. Our key results, the optimal contracts for financing venture projects, are solved and discussed in Section 3. Section 4 performs comparative statics on the optimal contracts. In the final section, we conclude and discuss possible directions for further research. If otherwise noted, all proofs are attached in the appendix. 4

6 2 Model We present our model of venture finance. This model does not aim to capture every aspect of the financing of venture projects. Instead, we make assumptions to highlight the analysis of security design and focus on the essence of flexible information acquisition, which will be rigorously characterized in this section. We will discuss these assumptions and their implications in detail. 2.1 Venture Finance Consider an economy with two dates, t = 0, 1, and a single consumption good (money). There are two agents in this economy: an entrepreneur and a deep-pocket investor. Both agents are risk neutral. Their utility function is the sum of consumptions over the two dates: u = c 0 + c 1, where c t denotes agent s consumption at date t. 1 We assume that the entrepreneur starts at date 0 with zero initial wealth, while the deep-pocket investor has large endowment at date 0. In what follows we use the subscripts E and I to indicate the entrepreneur and the investor, respectively. We consider the innovation technology owned by the entrepreneur and its finance. To initiate the venture project at date 0, the technology requires a capital investment k > 0. The project cannot be initiated partially. Hence, the entrepreneur has to borrow k from the investor, by selling a security to the investor at date 0. The security traded constructs the contract between the two agents, so that we take the terms security and contract to mean the same thing and use them exchangeably. We focus on the cash flow aspect of contracts and innovations. If initiated, the venture project generates a non-negative verifiable random cash flow θ at date 1. We specify the processes of security design and information acquisition. The payment of an asset-backed security at date 1 is a mapping s : R + R + such that s(θ) [0, θ] for any θ. At date 0, both agents have a common prior P on the future cash flow θ of the venture project, if initiated. The entrepreneur designs the security, and then proposes a take-it-or-leave-it offer to the investor at price k at date 0. Facing the offer, the investor acquires information about the future cash flow θ in the manner of rational inattention (Sims, 2003; Yang, 2012a, 2012b), and then decides whether to accept the offer. This characterizes the process of flexible information acquisition, where the information acquired is measured by reduction of entropy. The information cost per unit reduction of entropy is µ. The concept of flexible information acquisition will be further elaborated in the next subsection. The entrepreneur could initiate the venture project if and only if the investor accepts the offer. This highlights the variable aggregate risk as a key feature in the finance of innovations and venture projects. 1 To focus on the essence, we do not explicitly consider discounting. Our results and underlying mechanisms do not rely on the discount between the two periods. 5

7 The implicit assumptions in the setting above are justified to capture the key features in the finance of venture projects, especially from an information acquisition perspective. First, the entrepreneur owns the technology while the investor has money, which reflects the double coincidence of wants. In particular, to highlight the double coincidence of wants, we assume that the entrepreneur has no money at all. This implies that the entrepreneur always prefers the venture project to be initiated, which is consistent with real practices. Second, both agents have a common prior on the uncertain profitability of the venture project but only the investor is able to acquire further information, which highlights the investor s information advantage in understanding market prospects. To focus on the essence of information acquisition, the bargaining process is abstracted as a take-it-or-leave-it offer from its reality, and no exogenous information asymmetry is assumed. This also implies that the allocation of control rights is not our focus. It is also worth highlighting what aspects of the finance of venture projects are abstracted away from the model, and to what extent these aspects affect our work. First, venture investors are unlikely to be risk neutral in reality. Nevertheless, the assumption of risk neutrality enables us to first focus on the role of information acquisition rather than risk allocation, which is of less interest for our purpose. Actually, our results would be only strengthened if we take investors risk aversion into account, which will be illustrated later. So we follow the risk neutral assumption to streamline our presentation and focus on the essence. Second, an interim cash flow, as modeled by the random variable θ, is unlikely to play a key role in the real-world venture finance setting. For example, most of the literature suggests that venture capitalist-backed firms lose money until well after going public and the exiting of the venture capitalists (Kaplan and Lerner, 2010; Da Rin, Hellmann and Puri, 2011). We could also, however, interpret the cash flow as an ex-post one, which already takes the consequence of venture investors exiting into account. In other words, the exiting nature of venture investors is already incorporated in the distribution of the future cash flow. This allows us to model a variety of venture investors not limited to venture capitalists, as well as to focus on the aspect of information acquisition. 2.2 Flexible Information Acquisition We follow Yang (2012a) to characterize the way through which the investor acquires information. In Yang (2012a), the author elaborates a general environment where an agent acquires information and thus makes a binary choice. The environment constructs the workplace of flexible information acquisition. 2 This environment and its corresponding implications also apply to our framework in this paper. Consider an agent who chooses a binary action a {0, 1} and receives a payoff u (a, θ), where θ Θ = R + is the fundamental, distributed according to a continuous probability measure P 2 For more detailed justification of this environment, see Woodford (2008) and Yang (2012a, 2012b). 6

8 over Θ. Before making the decision, the agent has access to a set of binary-signal information structures. 3 In particular, she observes binary signals x {0, 1} parameterized by a measurable function m : Θ [0, 1], where m (θ) is the probability of observing signal 1 if the true state is θ. When observing signal 1, the agent s optimal action is 1. The conditional probability function m (θ) describes the agent s decision rule of information acquisition. By choosing different functional forms of m (θ), the agent can make her signal covary with fundamental in any arbitrary way. Intuitively, for instance, if the agent s payoff is sensitive to fluctuations of the state within some range A Θ, she would pay more attention to this range by specifying m (θ) to be highly sensitive to θ A. This example also illustrates the concept of flexible information acquisition. As opposed to classic information acquisition technologies that often involve restrictions on the signals to be acquired, flexible information acquisition allows agents to choose signals drawn from any conditional distribution of the fundamental. The functional form of m(θ), intuitively, its shape, determines the quantity and quality of information acquired. We then characterize the quantitative and qualitative nature of information. As in Yang (2011a), information conveyed by an information structure m ( ) is defined as the expected reduction of uncertainty through observing the signal generated by m ( ), where the uncertainty associated with a distribution is measured by Shannon (1948) s entropy. Specifically, to formulate the process of flexible information acquisition and the underlying transition from prior to posterior, we employ the concept of mutual information, which is defined as the difference between agents prior entropy and expected posterior entropy: I (m) = H(prior) H (posterior) = g (E Θ [m(θ)]) ( E Θ [g (m (θ))]) = E Θ [g (m (θ)]) g (E Θ [m(θ)]), where g (x) = x ln x + (1 x) ln (1 x), and the expectation operator E Θ ( ) is with respect to θ under the probability measure P. In what follows we omit the subscript Θ for simplicity. We specify the cost of information. Denote M = {m L (Θ, P ) : θ Θ, m (θ) [0, 1]} as the set of binary-signal information structures. Let c : M R + be the cost of information. As in Yang (2012a), we assume that the cost is proportional to the associated mutual information: c (m) = µ I (m), 3 In general, an agent can get access to any information structure. But it could be shown that the agent always prefers binary-signal information structures in binary decision problems. See Woodford (2009) and Yang (2012b) for more discussions. 7

9 where µ > 0 is the marginal cost of information acquisition. This concludes the general environment of binary decision problem with flexible information acquisition. Built upon the concept of flexible information acquisition, the agent s problem is to choose a functional form of m(θ) to maximize her expected payoff minus the information cost. characterize the optimal decision rule m(θ) in the following proposition. We denote u(θ) = u(1, θ) u(0, θ), which is the the payoff gain of taking action 1 over action 0. We also assume that Pr [ u (θ) 0] > 0 to exclude the trivial case where the agent is always indifferent between the two actions. The proof is in Yang (2012a). Proposition 1. (Yang, 2012a) Given u, Θ, P, and µ, let m(θ) M be an optimal decision rule and p = E [m(θ)] be the corresponding unconditional probability of taking action 1. Then, i) the optimal decision rule is unique; ii) there are three cases for the optimal decision rule: a) p = 1, i.e., P r(m (θ) = 1) = 1 if and only if E [ exp ( µ 1 u (θ) )] 1 ; b) p = 0, i.e., P r(m (θ) = 0) = 1 if and only if c) 0 < p < 1 if and only if E [ exp ( µ 1 u (θ) )] 1 ; E [ exp ( µ 1 u (θ) )] > 1 and E [ exp ( µ 1 u (θ) )] > 1 ; (2.1) in this case, the optimal decision rule m(θ) is determined by the equation for all θ Θ, where u (θ) = µ (g (m (θ)) g ( p) ) (2.2) ( ) x g (x) = ln 1 x Proposition 1 fully characterizes the agent s possible optimal decisions of information acquisition. Case a) and case b) correspond to the scenario where the prior is extreme in the sense that there exists an ex-ante optimal action 1 or 0. These two cases do not involve information acquisition, and thus they also correspond to the scenario where the cost of information acquisition is sufficiently high. In contrast, case c), the more interesting one, involves information acquisition. Especially, the optimal decision rule m(θ) is not constant in this case, and neither action 1 nor action 0 is ex-ante optimal. Intuitively, this case corresponds to the scenario where the prior is 8. We

10 not extreme, or the cost of information acquisition is sufficiently low. In case c) where information acquisition is involved in the optimal decision rule, the agent equates the marginal benefit of information to the marginal cost of information. By doing so, the agent chooses the shape of her optimal decision rule m(θ) according to the shape of payoff gain u(θ) and her prior P, which process is consistent with the essence of flexible information acquisition. 4 3 Security Design and the Optimal Contract We consider the security design problem between the entrepreneur and the investor. We denote the entrepreneur s optimal contract by s (θ). The strategic circumstance between the entrepreneur and the investor is a dynamic Bayesian game with sequential moves. Concretely, the entrepreneur first designs the contract, and then the investor acquires information according to the contract and decides whether to accept the contract. In Proposition 1, we have characterized the general optimal decision rule for the agent who acquires information. Hence, we apply the results in Proposition 1 to the investor s decision problem, given the entrepreneur s contract, and then solve for the entrepreneur s optimal contract by backward induction. To distinguish from the general decision problem discussed above, we denote the investor s optimal decision rule of information acquisition as m s (θ), given the contract s(θ). The investor s optimal decision rule of information acquisition given the entrepreneur s optimal contract s (θ) will be denoted by m s(θ). We formally define the equilibrium of this model as follows. Definition 1. The sequential equilibrium is defined as a collection of the entrepreneur s optimal contract s (θ) and the investor s optimal decision rule of information acquisition m s(θ) based on which: i). Given u, Θ, P, k and µ, s (θ) and m s(θ) maximize the expected payoffs of the entrepreneur and the investor, respectively. ii). Both agents use the Bayes rule to update their beliefs about the fundamental θ, and follow sequential rationality. According to Proposition 1, there are three cases pertaining to the investor s behavior, given the entrepreneur s optimal contract. First, the investor may optimally choose to not acquire any information and accept the entrepreneur s optimal contract directly. Second, the investor may optimally acquire some information, induced by the entrepreneur s optimal contract, and then accept the entrepreneur s optimal contract with positive probability (but less than one). Third, the investor may directly reject the entrepreneur s optimal contract without any information acquisition. This last case corresponds to the outside option of the entrepreneur, who can always propose nothing to the investor and end up skipping the project. Therefore, it is less interesting to 4 See Woodford (2008), Yang (2012a, 2012b) for more examples on this decision problem. 9

11 characterize the last case explicitly. All the three cases could be accommodated by the equilibrium definition, and they may correspond to three types of equilibrium. In what follows, we first characterize the entrepreneur s optimal contract, focusing on the first two types of equilibrium. Specifically, we pay attention to the shape of the optimal contracts. As we will see below, the entrepreneur s optimal contracts in these two cases are different. This difference also implies different relationships between the shapes of contracts and the roles of information. We will later solve the entrepreneur s problem fully and deliver the exact optimal contract given certain exogenous parameters. 3.1 Optimal Contract without Inducing Information Acquisition In this subsection, we consider the case in which the entrepreneur s optimal contract is directly accepted by the investor without any information acquisition. In other words, it is optimal for the entrepreneur to design such a contract that does not induce the investor to acquire information. Concretely, this means P r [m s (θ) = 1] = 1. We first consider the investor s problem of information acquisition, given the entrepreneur s contract. Then we follow by characterizing the entrepreneur s optimal contract. Given a contract s(θ), the investor s payoff gain by accepting the contract over rejecting it is u I (θ) = u I (1, θ) u I (0, θ) = s (θ) k. (3.1) According to Proposition 1 and conditions (2.1) and (3.1), any contract s(θ) that is accepted by the investor without information acquisition must satisfy E [ exp ( µ 1 (s (θ) k) )] 1. (3.2) In particular, if the left hand side of the inequality (3.2) is strictly less than one, the entrepreneur could always lower s(θ) to some extent to increase her expected payoff gain, without changing the investor s incentive. Hence, this condition (3.2) always holds as an equality in equilibrium. Therefore, the entrepreneur s problem is to choose an contract s(θ) to maximize her expected payoff u E (s(θ)) = E [θ s(θ)] subject to the investor s information acquisition constraint E [ exp ( µ 1 (s (θ) k) )] = 1, the entrepreneur s individual rationality constraint E [θ s(θ)] 0, 10

12 and the feasibility condition 0 s(θ) θ. It is interesting to observe that the entrepreneur s individual rationality constraint is automatically satisfied, given the feasibility constraints. This comes from the fact that the entrepreneur is assumed to have no money at all to start. This fact also implies that the entrepreneur always prefers the project to be initiated, which is consistent with the real-world practices. Note that, it is not correct to interpret this in a way that the entrepreneur would like to contract with any individual venture investor, whatever the contract is. This is because we do not explicitly model the competition between different venture investors, so that the venture investor in our model indeed represents a collection of all venture investors in the market. As we would see, the entrepreneur s optimal contract in this case follows a standard debt. We analytically characterize this optimal contract by the following proposition, along with its graphical illustration. Proposition 2. If the entrepreneur s optimal contract s (θ) induces the investor to accept the contract without acquiring information in equilibrium, then it takes the form of a standard debt: s (θ) = min (θ, D ) where the face value D is determined by D = k µ ln(λ 1 µ), in which λ is a positive constant determined in equilibrium s(θ) θ Figure 1: The Unique Optimal Contract without Information Acquisition It is intuitive to have the standard debt as the optimal contract when it does not induces information acquisition. In the case without inducing information acquisition, the optimal contract indeed makes the investor break even between acquiring and not acquiring information. Hence, thanks to the definition of flexible information acquisition, any mean-preserving spread of the 11

13 optimal contract, which gives the entrepreneur the same expected payoff, would induce the investor to acquire information. Since it is optimal for the entrepreneur to design a less information sensitive security to deter information acquisition in this case, the debt is the least information sensitive one to provide the desired expected payoff to the seller. More specifically, it is the flat part of the debt that mitigates the investor s incentive to acquire information to the extent at which the buyer just wants to give up acquiring information, while delivers the highest possible expected payoff to the entrepreneur. As a result, the debt is the entrepreneur s uniquely optimal choice in this case. The standard debt, as the optimal contract, accounts for to the real-world scenarios in which some venture projects are financed by short-term fixed-income financial instruments. We will discuss this point in more details below. 3.2 Optimal Contract Inducing Information Acquisition In this subsection, we characterize the entrepreneur s optimal contract if it induces the investor to acquire information and accept the contract with positive probability (but less than one). In other words, it is optimal for the entrepreneur to design such a contract that induces the investor to acquire information. Concretely, this means P r [m s (θ) = 1] (0, 1). Again, according to Proposition 1 and conditions (2.1) and (3.1), any contract s(θ) that induces the investor to acquire information must satisfy E [ exp ( µ 1 (s (θ) k) )] > 1 (3.3) and E [ exp ( µ 1 (s (θ) k) )] > 1, (3.4) As discussed above, when conditions (3.3) and (3.4) are satisfied, neither accepting nor rejecting the contract is ex-ante optimal for the investor. As a result, the investor finds it optimal to first acquire some information and then make the decision according to her posterior. In other words, in this case, the contract proposed by the entrepreneur will induce information acquisition by the investor. Given such a contract s(θ), Proposition 1 and condition (2.2) also prescribe that the investor s optimal decision rule of information acquisition m s (θ) is uniquely characterized by s (θ) k = µ (g (m s (θ)) g (p s ) ), (3.5) where p s = E [m s (θ)] is the investor s unconditional probability of accepting the contract. In what follows, we also denote this unconditional probability induced by the entrepreneur s optimal contract by p s. Con- 12

14 dition (3.5) concludes the investor s decision problem, given the contract s(θ) proposed by the entrepreneur. We derive the entrepreneur s optimal contract by backward induction. Taking into account of investor s response m s, the entrepreneur chooses an contract s (θ) to maximize her expected payoff u E (s(θ)) = E [m s (θ) (θ s (θ))] (3.6) subject to (3.3), (3.4), 5 (3.5), the entrepreneur s individual rationality constraint E [m s (θ) (θ s (θ))] 0, and the feasibility condition 0 s (θ) θ. In characterizing the entrepreneur s optimal contract s (θ) when it induces information acquisition, we proceed by two steps. First, to streamline the presentation and fix the idea, we solve for an unconstrained optimal contract in this case without the feasibility condition 0 s(θ) θ. We denote the solution by ŝ(θ). We also denote the corresponding information acquisition rule by m s (θ). 6 We try to highlight that the feasibility condition is a mechanical restriction on the potential securities. Importantly, it is not directly relevant to the entrepreneur s motives in designing the contracts, which are aiming to induce the investor to acquire information that is most favorable to the entrepreneur. Hence, the unconstrained optimal contract ŝ(θ) helps to reveal the relationship between contract design and information acquisition in a clearer manner. After that, we resume the feasibility condition and characterize the exact optimal contract s (θ). This two-step approach streamlines our presentation and makes the intuition clearer. For the unconstrained optimal contract ŝ(θ) in the case with information acquisition, we have the following lemma. Lemma 1. In an equilibrium with information acquisition, the unconstrained optimal contract ŝ(θ) and its corresponding information acquisition rule m s (θ) are determined by ŝ (θ) k = µ (g ( m s (θ)) g (p s) ), (3.7) where and p s = E [m s(θ)], (1 m s (θ)) (θ ŝ(θ) + w ) = µ, (3.8) 5 It is worth noting that, according to Proposition 1, both conditions (3.3) and (3.4) should not be binding for the optimal contract; otherwise the investor would not acquire information. See Yang (2012a) for more details. 6 Note that, m s(θ) is not exactly the solution to the entrepreneur s problem without the feasibility condition, but is a translation of that solution. This will be seen clearer in the statement of Lemma 1. 13

15 where [ w = E (θ s g (p ] ( [ (θ)) s) g (p ]) 1 g (m 1 E s) s(θ)) g (m, s(θ)) in which p s and w are two constants that do not depend on θ. Lemma 1 exhibits the relationship between the unconstrained optimal contract and the corresponding decision rule for information acquisition. Recall Proposition 1, condition (3.7) specifies how the investor responses to the unconstrained optimal contract ŝ(θ) by adjusting her decision rule of information acquisition m s (θ). On the other hand, condition (3.8) is derived from the entrepreneur s optimization problem. It describes the entrepreneur s optimal choices of cash flows across states, which is summarized by the unconstrained optimal contract, given the investor s decision rule of information acquisition. In equilibrium, ŝ(θ) and m s (θ) are jointly determined. This again highlights the close relationship between security design and information acquisition in our context. Although it is mathematically difficult to solve the system of differential equations (3.7) and (3.8), we are able to deliver some important analytical characteristics of the unconstrained optimal contract ŝ(θ) and the corresponding information acquisition rule m s (θ). In particular, we are confident enough to speak to the shape of the unconstrained optimal contract ŝ(θ) as well as the actual optimal contract s (θ) by these analytical properties. The following lemma gives the key results. Lemma 2. In an equilibrium with information acquisition, the unconstrained optimal contract ŝ(θ) and the corresponding information acquisition rule m s (θ) satisfy ŝ (θ) θ = 1 m s (θ) (0, 1) (3.9) and m s (θ) θ = µ 1 m s (θ) (1 m s (θ)) 2. (3.10) We have several interesting observations from Lemma 2. First, condition (3.9) implies that the unconstrained optimal contract ŝ (θ) is strictly increasing. This is because, by definition, we have 0 < m s (θ) < 1, and thus the right hand side of (3.9) is positive. Second, the unconstrained optimal contract ŝ (θ) is strictly concave. This is because conditions (3.9) and (3.10) imply 2 ŝ(θ) θ 2 = µ 1 m s (θ) (1 m s (θ)) 2, the right hand side of which is negative. Therefore, the unconstrained optimal contract ŝ(θ) is an increasing concave function of θ. As opposed to the classic literature in security design, which often restrict the attention to non-decreasing securities (Innes, 1990; Nachman and Noe, 1994; DeMarzo and Duffie, 1999; DeMarzo 2005), it is intuitive to have the increasing unconstrained optimal contract as a result of our model. In the venture finance context, the investor provides 14

16 two different types of services to the entrepreneur. The first is the investment required to initiate the project, and the second is the information about the project s market prospect. In particular, these two services work in a way that they affect the probability of acceptance, at which the project takes place. As a result, it is natural for the entrepreneur to compensate the investor more in an event of higher profit, in exchange of these two types of services that make the project possible. More specifically, Lemma 2, especially the increasing and concave nature of the unconstrained optimal contract, reveals the relationship between the shape of the contract and the information acquired in a clearer way. Recall that the ratio m s (θ)/ θ represents the attention placed at state θ by the investor. When the slope of the contract changes more drastically around a state, which implies the change of payoff is more significant, the investor wants to acquire more information around that state. Furthermore, the contract is designed by the entrepreneur to take advantage of the investor s information expertise. Hence, the monotonicity and concaveness of the unconstrained optimal contract actually reflect the entrepreneur s payoff sensitiveness across states. On the one hand, the unconstrained optimal contract is strictly increasing, which always encourages the investor to acquire some information around all states. The reason is straightforward. As the entrepreneur cannot initiate the project by herself, she would like to encourage the investor to acquire information at all states in order to increase the probability of acceptance, at which the project would be initiated, to the maximal extent. On the other hand, the unconstrained optimal contract is concave, which implies that the information in all states is not equally valuable to the entrepreneur. In particular, more precise information is less valuable to the entrepreneur in a higher state than in a lower state. The intuition here is also clear. For a lower state, a given amount of additional information would significantly improve the posterior of the investor, which encourages her to make the decision of acceptance that is in favor of the entrepreneur. For a higher state, however, the same amount of additional information would be less valuable, because the higher state is already enough attractive to the investor given her prior, and thus a more precise posterior would not add much. In other words, it would not affect the probability of acceptance too much if the investor has less precise information for higher states, if she is confident enough by acquiring sufficiently precise information for the lower states. As a consequence, it is desirable for the entrepreneur to reduce the share to the investor in higher states. By doing this, the entrepreneur not only grasps a considerable share of the project s future cash flow, but also gives the investor enough and efficient incentives to acquire information that is favorable to the entrepreneur. Having characterizing the unconstrained optimal contract ŝ(θ), we bring in the feasibility constraints 0 s(θ) θ and analyze the actual optimal contract s (θ). It is instructive to have the following lemma to illustrate the possible relative positions between the unconstrained optimal contract and the feasibility constraints. 15

17 Lemma 3. Three possible relative positions between the unconstrained optimal contract ŝ(θ) and the feasibility constraints 0 s(θ) θ may occur in equilibrium, in the θ s space: i). ŝ(θ) intersects with the 45 line s = θ at ( θ, θ), θ > 0, and does not intersect with the horizontal axis s = 0. ii). ŝ(θ) goes through the origin (0, 0), and does not intersect with either the 45 line s = θ or the horizontal axis s = 0 for any θ 0. iii). ŝ(θ) intersects with the horizontal axis s = 0 at ( θ, 0), θ > 0, and does not intersect with the 45 line s = θ. In the three different cases, it is easy to imagine that the actual optimal contract s (θ) will be constrained by the feasibility condition in different ways. For example, the optimal contract will be constrained by the 45 line s = θ in case i) and by the horizontal axis s = 0 in case iii). Our concern is whether the presence of the two feasibility constraints would significantly change the interplay between security design and information acquisition, and thus the resulting optimal contract. Fortunately, the answer is no. As expected, the feasibility constraints are only mechanical. By imposing the feasibility conditions, we have the following characterization for the optimal contract: Lemma 4. In an equilibrium with information acquisition, the corresponding optimal contract s (θ) satisfies θ if ŝ(θ) > θ s (θ) = ŝ(θ) if 0 ŝ(θ) θ 0 if ŝ(θ) < 0 where ŝ(θ) is the corresponding unconstrained optimal contract., (3.11) Lemma 4 is important because it tells us how to construct an optimal contract with information acquisition from its corresponding unconstrained optimal contract. Concretely, the optimal contract s (θ) will follow its corresponding unconstrained optimal contract ŝ(θ) when the latter is within the feasible region 0 s θ. When the unconstrained optimal contract is out of the feasible region, the resulting optimal contract will follow one of the feasibility constraints that is binding. The expression of Lemma 4 is fairly simple but the result is not trivial. Importantly, the presence of the feasibility constraints indeed changes the shapes of the resulting optimal contracts from its unconstrained counterparts, which implies that the investor s incentives of information acquisition is also changed. Nevertheless, Lemma 4 ensures us that such change does not affect the entrepreneur s choice of the cash flow allocations in the states where the feasibility constraints are not binding. Also, in the states where the feasibility constraints are binding, Lemma 4 tells us that it is still optimal for the entrepreneur to just hit the binding constraints to exploit the investor s information advantage to the largest extent. 16

18 Therefore, we can apply Lemma 4 to the three cases of the unconstrained optimal contract ŝ(θ) described in Lemma 3. This gives the three potential cases of the optimal contract s (θ), respectively. Lemma 5. In an equilibrium with information acquisition, the optimal contract s (θ) may take one of the following three forms: i). When the corresponding unconstrained optimal contract ŝ(θ) intersects with the 45 line s = θ at ( θ, θ), θ > 0, we have s θ if 0 θ < θ (θ) = ŝ (θ) if θ θ ii). When the corresponding unconstrained optimal contract ŝ(θ) goes through the origin (0, 0), we have s (θ) = ŝ (θ) for θ R +. iii). When the corresponding unconstrained optimal contract ŝ(θ) intersects with the horizontal axis s = 0 at ( θ, 0), θ > 0, we have s 0 if 0 θ < θ (θ) = ŝ (θ) if θ θ We illustrate the three cases of optimal contracts s (θ) in the following graph... Figure 2: Potential Shapes of the Optimal Contracts The three potential cases of the optimal contract s (θ) take different shapes. Specifically, in case i), the optimal contract follows a standard debt in bad states but increases as a concave function in good states. In case iii), the payment of optimal contract in bad states is zero, while is an increasing and concave function in good states. Case ii) lies in between as a cut-off case, in which the payment of optimal contract is an increasing and concave function. Having characterizing the potential cases of the optimal contract s (θ) by its differential properties, we proceed by checking whether these three potential cases are indeed the valid solution to the entrepreneur s problem in an equilibrium with information acquisition. Interestingly, not all the three cases can occur in equilibrium. The following proposition tells us that only the optimal contract in case i) can actually sustain an equilibrium with information acquisition. 17

19 Proposition 3. If the entrepreneur s optimal contract s (θ) induces the investor to acquire information in equilibrium, then it must follow case i) in Lemma 5, which corresponds to a (participating) convertible preferred stock with a face value θ s(θ) θ Figure 3: The Unique Optimal Contract with Information Acquisition The underlying intuition for us to rule out the last two potential cases of the optimal contract is consistent with the practice of venture finance in reality. Recall that the investor can always reject the offer and enjoy her outside option, which is normalized to zero in the context, if her expected payoff is negative. The rejection of the contract, however, is always sub-optimal to the entrepreneur, as long as the project has a positive expected future cash flow. As a result, the entrepreneur wants to make sure that the investor, who makes the initial investment and takes cost to acquire information, is sufficiently compensated so that she is willing to accept the contract. The last two cases described in Lemma 5 corresponds to the scenarios in which the investor is not enough compensated so that the contract is rejected. To link this intuition to the real-world practice, because venture technologies often involve considerable intangible parts and high uncertainty, venture investors often ask for a large amount of compensations in bad states for a downside protection, in terms of the cash flow rights. Actually, the last two cases in Lemma 5 look closest to the common stock, which is the least used contract between entrepreneurs and investors in real-world venture finance cases (Kaplan and Stromberg, 2003; Kaplan and Lerner, 2010; Lerner, Leamon and Hardymon, 2012). In particular, Proposition 3 offers a very specific prediction on the entrepreneur s optimal contracts which may be employed in financing venture projects. Specifically, the optimal contract follows a debt in bad states until its face value and still increases in good states, which corresponds to a convertible preferred stock. In particular, it is closet to the participating convertible preferred stock, which grants the holder a right to receive both the face value and their equity participation as if the stock were converted, in the event of a sale or liquidation. This is consistent with the empirical evidences of venture capital contracts, in which the convertible preferred stock 18

Security Design in a Production Economy with Flexible Information Acquisition

Security Design in a Production Economy with Flexible Information Acquisition Security Design in a Production Economy with Flexible Information Acquisition Ming Yang Duke University Yao Zeng Harvard University This Version: March, 2015 First Draft: June, 2012 Abstract We offer a

More information

Financing Entrepreneurial Production: Security Design with Flexible Information Acquisition

Financing Entrepreneurial Production: Security Design with Flexible Information Acquisition Financing Entrepreneurial Production: Security Design with Flexible Information Acquisition Ming Yang Duke University Yao Zeng Harvard University This Version: October, 2015 First Draft: June, 2012 Abstract

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter Microeconomics of Consumer Theory The two broad categories of decision-makers in an economy are consumers and firms. Each individual in each of these groups makes its decisions in order to achieve

More information

Feedback Effect and Capital Structure

Feedback Effect and Capital Structure Feedback Effect and Capital Structure Minh Vo Metropolitan State University Abstract This paper develops a model of financing with informational feedback effect that jointly determines a firm s capital

More information

Comparing Allocations under Asymmetric Information: Coase Theorem Revisited

Comparing Allocations under Asymmetric Information: Coase Theorem Revisited Comparing Allocations under Asymmetric Information: Coase Theorem Revisited Shingo Ishiguro Graduate School of Economics, Osaka University 1-7 Machikaneyama, Toyonaka, Osaka 560-0043, Japan August 2002

More information

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren October, 2013 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that

More information

Characterization of the Optimum

Characterization of the Optimum ECO 317 Economics of Uncertainty Fall Term 2009 Notes for lectures 5. Portfolio Allocation with One Riskless, One Risky Asset Characterization of the Optimum Consider a risk-averse, expected-utility-maximizing

More information

Financial Economics Field Exam August 2011

Financial Economics Field Exam August 2011 Financial Economics Field Exam August 2011 There are two questions on the exam, representing Macroeconomic Finance (234A) and Corporate Finance (234C). Please answer both questions to the best of your

More information

Two-Dimensional Bayesian Persuasion

Two-Dimensional Bayesian Persuasion Two-Dimensional Bayesian Persuasion Davit Khantadze September 30, 017 Abstract We are interested in optimal signals for the sender when the decision maker (receiver) has to make two separate decisions.

More information

Chapter 6: Supply and Demand with Income in the Form of Endowments

Chapter 6: Supply and Demand with Income in the Form of Endowments Chapter 6: Supply and Demand with Income in the Form of Endowments 6.1: Introduction This chapter and the next contain almost identical analyses concerning the supply and demand implied by different kinds

More information

Chapter 23: Choice under Risk

Chapter 23: Choice under Risk Chapter 23: Choice under Risk 23.1: Introduction We consider in this chapter optimal behaviour in conditions of risk. By this we mean that, when the individual takes a decision, he or she does not know

More information

Gathering Information before Signing a Contract: a New Perspective

Gathering Information before Signing a Contract: a New Perspective Gathering Information before Signing a Contract: a New Perspective Olivier Compte and Philippe Jehiel November 2003 Abstract A principal has to choose among several agents to fulfill a task and then provide

More information

On the use of leverage caps in bank regulation

On the use of leverage caps in bank regulation On the use of leverage caps in bank regulation Afrasiab Mirza Department of Economics University of Birmingham a.mirza@bham.ac.uk Frank Strobel Department of Economics University of Birmingham f.strobel@bham.ac.uk

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

PAULI MURTO, ANDREY ZHUKOV

PAULI MURTO, ANDREY ZHUKOV GAME THEORY SOLUTION SET 1 WINTER 018 PAULI MURTO, ANDREY ZHUKOV Introduction For suggested solution to problem 4, last year s suggested solutions by Tsz-Ning Wong were used who I think used suggested

More information

Information Processing and Limited Liability

Information Processing and Limited Liability Information Processing and Limited Liability Bartosz Maćkowiak European Central Bank and CEPR Mirko Wiederholt Northwestern University January 2012 Abstract Decision-makers often face limited liability

More information

New product launch: herd seeking or herd. preventing?

New product launch: herd seeking or herd. preventing? New product launch: herd seeking or herd preventing? Ting Liu and Pasquale Schiraldi December 29, 2008 Abstract A decision maker offers a new product to a fixed number of adopters. The decision maker does

More information

d. Find a competitive equilibrium for this economy. Is the allocation Pareto efficient? Are there any other competitive equilibrium allocations?

d. Find a competitive equilibrium for this economy. Is the allocation Pareto efficient? Are there any other competitive equilibrium allocations? Answers to Microeconomics Prelim of August 7, 0. Consider an individual faced with two job choices: she can either accept a position with a fixed annual salary of x > 0 which requires L x units of labor

More information

Impact of Imperfect Information on the Optimal Exercise Strategy for Warrants

Impact of Imperfect Information on the Optimal Exercise Strategy for Warrants Impact of Imperfect Information on the Optimal Exercise Strategy for Warrants April 2008 Abstract In this paper, we determine the optimal exercise strategy for corporate warrants if investors suffer from

More information

Settlement and the Strict Liability-Negligence Comparison

Settlement and the Strict Liability-Negligence Comparison Settlement and the Strict Liability-Negligence Comparison Abraham L. Wickelgren UniversityofTexasatAustinSchoolofLaw Abstract Because injurers typically have better information about their level of care

More information

Reputation and Securitization

Reputation and Securitization Reputation and Securitization Keiichi Kawai Northwestern University Abstract We analyze a dynamic market with a seller who can make a one-time investment that affects the returns of tradable assets. The

More information

Bargaining and exclusivity in a borrower lender relationship

Bargaining and exclusivity in a borrower lender relationship Rev. Econ. Design DOI 10.1007/s10058-007-0024-5 ORIGINAL PAPER Bargaining and exclusivity in a borrower lender relationship Levent Koçkesen Saltuk Ozerturk Received: 3 November 2004 / Accepted: 29 November

More information

The Effect of Speculative Monitoring on Shareholder Activism

The Effect of Speculative Monitoring on Shareholder Activism The Effect of Speculative Monitoring on Shareholder Activism Günter Strobl April 13, 016 Preliminary Draft. Please do not circulate. Abstract This paper investigates how informed trading in financial markets

More information

Chapter 19 Optimal Fiscal Policy

Chapter 19 Optimal Fiscal Policy Chapter 19 Optimal Fiscal Policy We now proceed to study optimal fiscal policy. We should make clear at the outset what we mean by this. In general, fiscal policy entails the government choosing its spending

More information

ECON Micro Foundations

ECON Micro Foundations ECON 302 - Micro Foundations Michael Bar September 13, 2016 Contents 1 Consumer s Choice 2 1.1 Preferences.................................... 2 1.2 Budget Constraint................................ 3

More information

(1 p)(1 ε)+pε p(1 ε)+(1 p)ε. ε ((1 p)(1 ε) + pε). This is indeed the case since 1 ε > ε (in turn, since ε < 1/2). QED

(1 p)(1 ε)+pε p(1 ε)+(1 p)ε. ε ((1 p)(1 ε) + pε). This is indeed the case since 1 ε > ε (in turn, since ε < 1/2). QED July 2008 Philip Bond, David Musto, Bilge Yılmaz Supplement to Predatory mortgage lending The key assumption in our model is that the incumbent lender has an informational advantage over the borrower.

More information

Venture Capitalists versus Angels: The Dynamics of. Private Firm Financing Contracts

Venture Capitalists versus Angels: The Dynamics of. Private Firm Financing Contracts Venture Capitalists versus Angels: The Dynamics of Private Firm Financing Contracts Thomas J Chemmanur Carroll School of Management Boston College Zhaohui Chen McIntire School of Commerce University of

More information

FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015.

FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015. FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015.) Hints for Problem Set 2 1. Consider a zero-sum game, where

More information

Bid-Ask Spreads and Volume: The Role of Trade Timing

Bid-Ask Spreads and Volume: The Role of Trade Timing Bid-Ask Spreads and Volume: The Role of Trade Timing Toronto, Northern Finance 2007 Andreas Park University of Toronto October 3, 2007 Andreas Park (UofT) The Timing of Trades October 3, 2007 1 / 25 Patterns

More information

Security Design Under Routine Auditing

Security Design Under Routine Auditing Security Design Under Routine Auditing Liang Dai May 3, 2016 Abstract Investors usually hire independent rms routinely to audit companies in which they invest. The e ort involved in auditing is set upfront

More information

Group-lending with sequential financing, contingent renewal and social capital. Prabal Roy Chowdhury

Group-lending with sequential financing, contingent renewal and social capital. Prabal Roy Chowdhury Group-lending with sequential financing, contingent renewal and social capital Prabal Roy Chowdhury Introduction: The focus of this paper is dynamic aspects of micro-lending, namely sequential lending

More information

Making Hard Decision. ENCE 627 Decision Analysis for Engineering. Identify the decision situation and understand objectives. Identify alternatives

Making Hard Decision. ENCE 627 Decision Analysis for Engineering. Identify the decision situation and understand objectives. Identify alternatives CHAPTER Duxbury Thomson Learning Making Hard Decision Third Edition RISK ATTITUDES A. J. Clark School of Engineering Department of Civil and Environmental Engineering 13 FALL 2003 By Dr. Ibrahim. Assakkaf

More information

The mean-variance portfolio choice framework and its generalizations

The mean-variance portfolio choice framework and its generalizations The mean-variance portfolio choice framework and its generalizations Prof. Massimo Guidolin 20135 Theory of Finance, Part I (Sept. October) Fall 2014 Outline and objectives The backward, three-step solution

More information

Auditing in the Presence of Outside Sources of Information

Auditing in the Presence of Outside Sources of Information Journal of Accounting Research Vol. 39 No. 3 December 2001 Printed in U.S.A. Auditing in the Presence of Outside Sources of Information MARK BAGNOLI, MARK PENNO, AND SUSAN G. WATTS Received 29 December

More information

Information and Evidence in Bargaining

Information and Evidence in Bargaining Information and Evidence in Bargaining Péter Eső Department of Economics, University of Oxford peter.eso@economics.ox.ac.uk Chris Wallace Department of Economics, University of Leicester cw255@leicester.ac.uk

More information

Angels, Venture Capitalists, and Entrepreneurs: A Dynamic Model of Private Equity Financing

Angels, Venture Capitalists, and Entrepreneurs: A Dynamic Model of Private Equity Financing Angels, Venture Capitalists, and Entrepreneurs: A Dynamic Model of Private Equity Financing Thomas J Chemmanur* and Zhaohui Chen** Oct., 31, 2001 *Finance department, Carroll school of management, Boston

More information

Where do securities come from

Where do securities come from Where do securities come from We view it as natural to trade common stocks WHY? Coase s policemen Pricing Assumptions on market trading? Predictions? Partial Equilibrium or GE economies (risk spanning)

More information

Financial Fragility A Global-Games Approach Itay Goldstein Wharton School, University of Pennsylvania

Financial Fragility A Global-Games Approach Itay Goldstein Wharton School, University of Pennsylvania Financial Fragility A Global-Games Approach Itay Goldstein Wharton School, University of Pennsylvania Financial Fragility and Coordination Failures What makes financial systems fragile? What causes crises

More information

1 Rational Expectations Equilibrium

1 Rational Expectations Equilibrium 1 Rational Expectations Euilibrium S - the (finite) set of states of the world - also use S to denote the number m - number of consumers K- number of physical commodities each trader has an endowment vector

More information

1 Two Period Exchange Economy

1 Two Period Exchange Economy University of British Columbia Department of Economics, Macroeconomics (Econ 502) Prof. Amartya Lahiri Handout # 2 1 Two Period Exchange Economy We shall start our exploration of dynamic economies with

More information

Product Di erentiation: Exercises Part 1

Product Di erentiation: Exercises Part 1 Product Di erentiation: Exercises Part Sotiris Georganas Royal Holloway University of London January 00 Problem Consider Hotelling s linear city with endogenous prices and exogenous and locations. Suppose,

More information

Market Timing Does Work: Evidence from the NYSE 1

Market Timing Does Work: Evidence from the NYSE 1 Market Timing Does Work: Evidence from the NYSE 1 Devraj Basu Alexander Stremme Warwick Business School, University of Warwick November 2005 address for correspondence: Alexander Stremme Warwick Business

More information

Extraction capacity and the optimal order of extraction. By: Stephen P. Holland

Extraction capacity and the optimal order of extraction. By: Stephen P. Holland Extraction capacity and the optimal order of extraction By: Stephen P. Holland Holland, Stephen P. (2003) Extraction Capacity and the Optimal Order of Extraction, Journal of Environmental Economics and

More information

Supplementary Material for: Belief Updating in Sequential Games of Two-Sided Incomplete Information: An Experimental Study of a Crisis Bargaining

Supplementary Material for: Belief Updating in Sequential Games of Two-Sided Incomplete Information: An Experimental Study of a Crisis Bargaining Supplementary Material for: Belief Updating in Sequential Games of Two-Sided Incomplete Information: An Experimental Study of a Crisis Bargaining Model September 30, 2010 1 Overview In these supplementary

More information

Reciprocity in Teams

Reciprocity in Teams Reciprocity in Teams Richard Fairchild School of Management, University of Bath Hanke Wickhorst Münster School of Business and Economics This Version: February 3, 011 Abstract. In this paper, we show that

More information

Web Appendix: Proofs and extensions.

Web Appendix: Proofs and extensions. B eb Appendix: Proofs and extensions. B.1 Proofs of results about block correlated markets. This subsection provides proofs for Propositions A1, A2, A3 and A4, and the proof of Lemma A1. Proof of Proposition

More information

Working Paper. R&D and market entry timing with incomplete information

Working Paper. R&D and market entry timing with incomplete information - preliminary and incomplete, please do not cite - Working Paper R&D and market entry timing with incomplete information Andreas Frick Heidrun C. Hoppe-Wewetzer Georgios Katsenos June 28, 2016 Abstract

More information

Effects of Wealth and Its Distribution on the Moral Hazard Problem

Effects of Wealth and Its Distribution on the Moral Hazard Problem Effects of Wealth and Its Distribution on the Moral Hazard Problem Jin Yong Jung We analyze how the wealth of an agent and its distribution affect the profit of the principal by considering the simple

More information

Rent Shifting and the Order of Negotiations

Rent Shifting and the Order of Negotiations Rent Shifting and the Order of Negotiations Leslie M. Marx Duke University Greg Shaffer University of Rochester December 2006 Abstract When two sellers negotiate terms of trade with a common buyer, the

More information

Econ 101A Final Exam We May 9, 2012.

Econ 101A Final Exam We May 9, 2012. Econ 101A Final Exam We May 9, 2012. You have 3 hours to answer the questions in the final exam. We will collect the exams at 2.30 sharp. Show your work, and good luck! Problem 1. Utility Maximization.

More information

A key characteristic of financial markets is that they are subject to sudden, convulsive changes.

A key characteristic of financial markets is that they are subject to sudden, convulsive changes. 10.6 The Diamond-Dybvig Model A key characteristic of financial markets is that they are subject to sudden, convulsive changes. Such changes happen at both the microeconomic and macroeconomic levels. At

More information

Income distribution and the allocation of public agricultural investment in developing countries

Income distribution and the allocation of public agricultural investment in developing countries BACKGROUND PAPER FOR THE WORLD DEVELOPMENT REPORT 2008 Income distribution and the allocation of public agricultural investment in developing countries Larry Karp The findings, interpretations, and conclusions

More information

Partial privatization as a source of trade gains

Partial privatization as a source of trade gains Partial privatization as a source of trade gains Kenji Fujiwara School of Economics, Kwansei Gakuin University April 12, 2008 Abstract A model of mixed oligopoly is constructed in which a Home public firm

More information

Online Appendix. Bankruptcy Law and Bank Financing

Online Appendix. Bankruptcy Law and Bank Financing Online Appendix for Bankruptcy Law and Bank Financing Giacomo Rodano Bank of Italy Nicolas Serrano-Velarde Bocconi University December 23, 2014 Emanuele Tarantino University of Mannheim 1 1 Reorganization,

More information

Definition of Incomplete Contracts

Definition of Incomplete Contracts Definition of Incomplete Contracts Susheng Wang 1 2 nd edition 2 July 2016 This note defines incomplete contracts and explains simple contracts. Although widely used in practice, incomplete contracts have

More information

Parallel Accommodating Conduct: Evaluating the Performance of the CPPI Index

Parallel Accommodating Conduct: Evaluating the Performance of the CPPI Index Parallel Accommodating Conduct: Evaluating the Performance of the CPPI Index Marc Ivaldi Vicente Lagos Preliminary version, please do not quote without permission Abstract The Coordinate Price Pressure

More information

Microeconomics Qualifying Exam

Microeconomics Qualifying Exam Summer 2018 Microeconomics Qualifying Exam There are 100 points possible on this exam, 50 points each for Prof. Lozada s questions and Prof. Dugar s questions. Each professor asks you to do two long questions

More information

GERMAN ECONOMIC ASSOCIATION OF BUSINESS ADMINISTRATION GEABA DISCUSSION PAPER SERIES IN ECONOMICS AND MANAGEMENT

GERMAN ECONOMIC ASSOCIATION OF BUSINESS ADMINISTRATION GEABA DISCUSSION PAPER SERIES IN ECONOMICS AND MANAGEMENT DISCUSSION PAPER SERIES IN ECONOMICS AND MANAGEMENT Tax and Managerial Effects of Transfer Pricing on Capital and Physical Products Oliver Duerr, Thomas Rüffieux Discussion Paper No. 17-19 GERMAN ECONOMIC

More information

Does Encourage Inward FDI Always Be a Dominant Strategy for Domestic Government? A Theoretical Analysis of Vertically Differentiated Industry

Does Encourage Inward FDI Always Be a Dominant Strategy for Domestic Government? A Theoretical Analysis of Vertically Differentiated Industry Lin, Journal of International and Global Economic Studies, 7(2), December 2014, 17-31 17 Does Encourage Inward FDI Always Be a Dominant Strategy for Domestic Government? A Theoretical Analysis of Vertically

More information

A Theory of the Size and Investment Duration of Venture Capital Funds

A Theory of the Size and Investment Duration of Venture Capital Funds A Theory of the Size and Investment Duration of Venture Capital Funds Dawei Fang Centre for Finance, Gothenburg University Abstract: We take a portfolio approach, based on simple agency conflicts between

More information

Signal or noise? Uncertainty and learning whether other traders are informed

Signal or noise? Uncertainty and learning whether other traders are informed Signal or noise? Uncertainty and learning whether other traders are informed Snehal Banerjee (Northwestern) Brett Green (UC-Berkeley) AFA 2014 Meetings July 2013 Learning about other traders Trade motives

More information

General Examination in Macroeconomic Theory SPRING 2016

General Examination in Macroeconomic Theory SPRING 2016 HARVARD UNIVERSITY DEPARTMENT OF ECONOMICS General Examination in Macroeconomic Theory SPRING 2016 You have FOUR hours. Answer all questions Part A (Prof. Laibson): 60 minutes Part B (Prof. Barro): 60

More information

On the 'Lock-In' Effects of Capital Gains Taxation

On the 'Lock-In' Effects of Capital Gains Taxation May 1, 1997 On the 'Lock-In' Effects of Capital Gains Taxation Yoshitsugu Kanemoto 1 Faculty of Economics, University of Tokyo 7-3-1 Hongo, Bunkyo-ku, Tokyo 113 Japan Abstract The most important drawback

More information

CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION

CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION Szabolcs Sebestyén szabolcs.sebestyen@iscte.pt Master in Finance INVESTMENTS Sebestyén (ISCTE-IUL) Choice Theory Investments 1 / 65 Outline 1 An Introduction

More information

Financial Contracting Theory Meets the Real World: An Empirical Analysis of Venture Capital Contracts

Financial Contracting Theory Meets the Real World: An Empirical Analysis of Venture Capital Contracts Preliminary and incomplete Financial Contracting Theory Meets the Real World: An Empirical Analysis of Venture Capital Contracts by Steven N. Kaplan and Per Strömberg* First Draft: March 1999 This Draft:

More information

Graduate Macro Theory II: Two Period Consumption-Saving Models

Graduate Macro Theory II: Two Period Consumption-Saving Models Graduate Macro Theory II: Two Period Consumption-Saving Models Eric Sims University of Notre Dame Spring 207 Introduction This note works through some simple two-period consumption-saving problems. In

More information

General Examination in Microeconomic Theory SPRING 2014

General Examination in Microeconomic Theory SPRING 2014 HARVARD UNIVERSITY DEPARTMENT OF ECONOMICS General Examination in Microeconomic Theory SPRING 2014 You have FOUR hours. Answer all questions Those taking the FINAL have THREE hours Part A (Glaeser): 55

More information

Problems with seniority based pay and possible solutions. Difficulties that arise and how to incentivize firm and worker towards the right incentives

Problems with seniority based pay and possible solutions. Difficulties that arise and how to incentivize firm and worker towards the right incentives Problems with seniority based pay and possible solutions Difficulties that arise and how to incentivize firm and worker towards the right incentives Master s Thesis Laurens Lennard Schiebroek Student number:

More information

Optimal Disclosure and Fight for Attention

Optimal Disclosure and Fight for Attention Optimal Disclosure and Fight for Attention January 28, 2018 Abstract In this paper, firm managers use their disclosure policy to direct speculators scarce attention towards their firm. More attention implies

More information

Online Appendix for Military Mobilization and Commitment Problems

Online Appendix for Military Mobilization and Commitment Problems Online Appendix for Military Mobilization and Commitment Problems Ahmer Tarar Department of Political Science Texas A&M University 4348 TAMU College Station, TX 77843-4348 email: ahmertarar@pols.tamu.edu

More information

Chapter 19: Compensating and Equivalent Variations

Chapter 19: Compensating and Equivalent Variations Chapter 19: Compensating and Equivalent Variations 19.1: Introduction This chapter is interesting and important. It also helps to answer a question you may well have been asking ever since we studied quasi-linear

More information

Auctions That Implement Efficient Investments

Auctions That Implement Efficient Investments Auctions That Implement Efficient Investments Kentaro Tomoeda October 31, 215 Abstract This article analyzes the implementability of efficient investments for two commonly used mechanisms in single-item

More information

Econ 101A Final exam Mo 18 May, 2009.

Econ 101A Final exam Mo 18 May, 2009. Econ 101A Final exam Mo 18 May, 2009. Do not turn the page until instructed to. Do not forget to write Problems 1 and 2 in the first Blue Book and Problems 3 and 4 in the second Blue Book. 1 Econ 101A

More information

Counterparty Risk in the Over-the-Counter Derivatives Market: Heterogeneous Insurers with Non-commitment

Counterparty Risk in the Over-the-Counter Derivatives Market: Heterogeneous Insurers with Non-commitment Counterparty Risk in the Over-the-Counter Derivatives Market: Heterogeneous Insurers with Non-commitment Hao Sun November 16, 2017 Abstract I study risk-taking and optimal contracting in the over-the-counter

More information

Closure in CGE Models

Closure in CGE Models in CGE Models Short Course on CGE Modeling, United Nations ESCAP Professor Department of Economics and Finance Jon M. Huntsman School of Business Utah State University jgilbert@usu.edu September 24-26,

More information

Microeconomic Theory August 2013 Applied Economics. Ph.D. PRELIMINARY EXAMINATION MICROECONOMIC THEORY. Applied Economics Graduate Program

Microeconomic Theory August 2013 Applied Economics. Ph.D. PRELIMINARY EXAMINATION MICROECONOMIC THEORY. Applied Economics Graduate Program Ph.D. PRELIMINARY EXAMINATION MICROECONOMIC THEORY Applied Economics Graduate Program August 2013 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models IEOR E4707: Foundations of Financial Engineering c 206 by Martin Haugh Martingale Pricing Theory in Discrete-Time and Discrete-Space Models These notes develop the theory of martingale pricing in a discrete-time,

More information

Bargaining Order and Delays in Multilateral Bargaining with Asymmetric Sellers

Bargaining Order and Delays in Multilateral Bargaining with Asymmetric Sellers WP-2013-015 Bargaining Order and Delays in Multilateral Bargaining with Asymmetric Sellers Amit Kumar Maurya and Shubhro Sarkar Indira Gandhi Institute of Development Research, Mumbai August 2013 http://www.igidr.ac.in/pdf/publication/wp-2013-015.pdf

More information

A Model of (the Threat of) Counterfeiting

A Model of (the Threat of) Counterfeiting w o r k i n g p a p e r 04 01 A Model of (the Threat of) Counterfeiting by Ed Nosal and Neil Wallace FEDERAL RESERVE BANK OF CLEVELAND Working papers of the Federal Reserve Bank of Cleveland are preliminary

More information

UCLA Department of Economics Ph.D. Preliminary Exam Industrial Organization Field Exam (Spring 2010) Use SEPARATE booklets to answer each question

UCLA Department of Economics Ph.D. Preliminary Exam Industrial Organization Field Exam (Spring 2010) Use SEPARATE booklets to answer each question Wednesday, June 23 2010 Instructions: UCLA Department of Economics Ph.D. Preliminary Exam Industrial Organization Field Exam (Spring 2010) You have 4 hours for the exam. Answer any 5 out 6 questions. All

More information

Trade Expenditure and Trade Utility Functions Notes

Trade Expenditure and Trade Utility Functions Notes Trade Expenditure and Trade Utility Functions Notes James E. Anderson February 6, 2009 These notes derive the useful concepts of trade expenditure functions, the closely related trade indirect utility

More information

Chapter 6 Firms: Labor Demand, Investment Demand, and Aggregate Supply

Chapter 6 Firms: Labor Demand, Investment Demand, and Aggregate Supply Chapter 6 Firms: Labor Demand, Investment Demand, and Aggregate Supply We have studied in depth the consumers side of the macroeconomy. We now turn to a study of the firms side of the macroeconomy. Continuing

More information

QED. Queen s Economics Department Working Paper No Junfeng Qiu Central University of Finance and Economics

QED. Queen s Economics Department Working Paper No Junfeng Qiu Central University of Finance and Economics QED Queen s Economics Department Working Paper No. 1317 Central Bank Screening, Moral Hazard, and the Lender of Last Resort Policy Mei Li University of Guelph Frank Milne Queen s University Junfeng Qiu

More information

Information aggregation for timing decision making.

Information aggregation for timing decision making. MPRA Munich Personal RePEc Archive Information aggregation for timing decision making. Esteban Colla De-Robertis Universidad Panamericana - Campus México, Escuela de Ciencias Económicas y Empresariales

More information

Revenue Equivalence and Income Taxation

Revenue Equivalence and Income Taxation Journal of Economics and Finance Volume 24 Number 1 Spring 2000 Pages 56-63 Revenue Equivalence and Income Taxation Veronika Grimm and Ulrich Schmidt* Abstract This paper considers the classical independent

More information

Problem Set 3: Suggested Solutions

Problem Set 3: Suggested Solutions Microeconomics: Pricing 3E00 Fall 06. True or false: Problem Set 3: Suggested Solutions (a) Since a durable goods monopolist prices at the monopoly price in her last period of operation, the prices must

More information

A Theory of Value Distribution in Social Exchange Networks

A Theory of Value Distribution in Social Exchange Networks A Theory of Value Distribution in Social Exchange Networks Kang Rong, Qianfeng Tang School of Economics, Shanghai University of Finance and Economics, Shanghai 00433, China Key Laboratory of Mathematical

More information

Robust Trading Mechanisms with Budget Surplus and Partial Trade

Robust Trading Mechanisms with Budget Surplus and Partial Trade Robust Trading Mechanisms with Budget Surplus and Partial Trade Jesse A. Schwartz Kennesaw State University Quan Wen Vanderbilt University May 2012 Abstract In a bilateral bargaining problem with private

More information

Fuel-Switching Capability

Fuel-Switching Capability Fuel-Switching Capability Alain Bousquet and Norbert Ladoux y University of Toulouse, IDEI and CEA June 3, 2003 Abstract Taking into account the link between energy demand and equipment choice, leads to

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program August 2017

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program August 2017 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program August 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

A Theory of Value Distribution in Social Exchange Networks

A Theory of Value Distribution in Social Exchange Networks A Theory of Value Distribution in Social Exchange Networks Kang Rong, Qianfeng Tang School of Economics, Shanghai University of Finance and Economics, Shanghai 00433, China Key Laboratory of Mathematical

More information

The Irrelevance of Corporate Governance Structure

The Irrelevance of Corporate Governance Structure The Irrelevance of Corporate Governance Structure Zohar Goshen Columbia Law School Doron Levit Wharton October 1, 2017 First Draft: Please do not cite or circulate Abstract We develop a model analyzing

More information

A Simple Model of Credit Rationing with Information Externalities

A Simple Model of Credit Rationing with Information Externalities University of Connecticut DigitalCommons@UConn Economics Working Papers Department of Economics April 2005 A Simple Model of Credit Rationing with Information Externalities Akm Rezaul Hossain University

More information

Problem Set 3: Suggested Solutions

Problem Set 3: Suggested Solutions Microeconomics: Pricing 3E Fall 5. True or false: Problem Set 3: Suggested Solutions (a) Since a durable goods monopolist prices at the monopoly price in her last period of operation, the prices must be

More information

Capital Adequacy and Liquidity in Banking Dynamics

Capital Adequacy and Liquidity in Banking Dynamics Capital Adequacy and Liquidity in Banking Dynamics Jin Cao Lorán Chollete October 9, 2014 Abstract We present a framework for modelling optimum capital adequacy in a dynamic banking context. We combine

More information

MANAGEMENT SCIENCE doi /mnsc ec

MANAGEMENT SCIENCE doi /mnsc ec MANAGEMENT SCIENCE doi 10.1287/mnsc.1110.1334ec e-companion ONLY AVAILABLE IN ELECTRONIC FORM informs 2011 INFORMS Electronic Companion Trust in Forecast Information Sharing by Özalp Özer, Yanchong Zheng,

More information

Government Safety Net, Stock Market Participation and Asset Prices

Government Safety Net, Stock Market Participation and Asset Prices Government Safety Net, Stock Market Participation and Asset Prices Danilo Lopomo Beteto November 18, 2011 Introduction Goal: study of the effects on prices of government intervention during crises Question:

More information

Competing Mechanisms with Limited Commitment

Competing Mechanisms with Limited Commitment Competing Mechanisms with Limited Commitment Suehyun Kwon CESIFO WORKING PAPER NO. 6280 CATEGORY 12: EMPIRICAL AND THEORETICAL METHODS DECEMBER 2016 An electronic version of the paper may be downloaded

More information

Chapter 4 Inflation and Interest Rates in the Consumption-Savings Model

Chapter 4 Inflation and Interest Rates in the Consumption-Savings Model Chapter 4 Inflation and Interest Rates in the Consumption-Savings Model The lifetime budget constraint (LBC) from the two-period consumption-savings model is a useful vehicle for introducing and analyzing

More information

Alternating-Offer Games with Final-Offer Arbitration

Alternating-Offer Games with Final-Offer Arbitration Alternating-Offer Games with Final-Offer Arbitration Kang Rong School of Economics, Shanghai University of Finance and Economic (SHUFE) August, 202 Abstract I analyze an alternating-offer model that integrates

More information